Using Anti-OSINT to Create a Positive Image of Internet Users to Prevent Criminal Acts

Authors

  • Marcin Konieczny Institute of Law and Administration Pomeranian University in Słupsk, Poland

DOI:

https://doi.org/10.15290/eejtr.2025.09.02.02

Keywords:

information from open sources, cyberspace, privacy, data analysis

Abstract

The role of using anti-OSINT to promote a positive image of Internet users and fight cybercrime is becoming increasingly important in the era of digital transformation. Therefore, the purpose of this study was to analyse the specific features of using OSINT as a legal means of obtaining and using Internet user data. To fulfil this purpose, various methods were employed, namely: dialectical, comparative legal, systematisation, descriptive, and systemic analysis. The analysis found that OSINT can be quite vulnerable to disinformation, as electronic identifiers can be easily modified, which increases the risk of falsifying the personal data found. It was found that there are methods of obtaining data, such as information about the operating system, fonts, screen settings, and plug-ins, which allow for more reliable user identification. This is becoming key to improving the effectiveness of intrusion detection systems and identifying potential intruders in the network. The study emphasised the need to take steps to change the culture, including reducing the attractiveness of abuse among users. This makes such negative behaviour less attractive and less supportive. One possible measure that can be taken is to limit the ability to create multiple accounts for a single user, which can help prevent “long-term” negative effects. To ensure the ethical use of OSINT and prevent negative consequences, it is vital to develop and follow clear rules that follow privacy and data protection laws. This will help create a prominent level of trust and security in the online environment.

Downloads

Download data is not yet available.

Author Biography

  • Marcin Konieczny, Institute of Law and Administration Pomeranian University in Słupsk, Poland

References

Bangsawan, M. I., Santoso, B., Diarti, D. K., Mahendra, S., & Kubota, E. (2020). Personal data protection policy during Covid-19 pandemic. Law and Justice, 1, 21-31. https://doi.org/10.23917/laj.v8i1.1558.

Block, L. (2023). The long history of OSINT. Journal of Intelligence History, 1, 1-15. https://doi.org/10.1080/16161262.2023.2224091.

Ciekanowski, Z., Gruchelski, M., Nowicka, J., Żurawski, S., & Pauliuchuk, Y. (2023). Cyberspace as a source of new threats to the security of the European Union. European Research Studies Journal, 26(3), 782-797. https://doi.org/10.35808/ersj/3249.

Congressional Research Service. (2007, December 5). Open source intelligence (OSINT): Issues for Congress [Report]. University of North Texas Libraries, UNT Digital Library. https://digital.library.unt.edu/ark:/67531/metadc819267/m1/20.

David, A., Jeganathan, G. S., & Azam, S. (2023). Internet users’ top concerns ensuring data privacy, security and protection. ICMRME-2023 Proceedings, 1, 1–17. https://www.researchgate.net/publication/372498509_Internet_Users_Top_Concerns_Ensuring_Data_Privacy_Security_and_Protection.

European Commission. (2020). White paper on artificial intelligence: A European approach to excellence and trust. https://ec.europa.eu/info/sites/info/files/commission-white-paper-artificial-intelligence-feb2020_en.pdf.

European Commission. (2020, February 19). White paper on artificial intelligence: A European approach to excellence and trust. https://ec.europa.eu/info/sites/info/files/commission-white-paper-artificial-intelligence-feb2020_en.pdf.

European Parliament and Council of the European Union. (2016a, April 27). Directive (EU) 2016/680 of the European Parliament and of the Council on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision 2008/977/JHA. Official Journal of the European Union, L 119, 89-131. https://eur-lex.europa.eu/eli/dir/2016/680/oj.

European Parliament and Council of the European Union. (2016b, April 27). Regulation (EU) 2016/679 of the European Parliament and of the Council on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). Official Journal of the European Union, L 119, 1-88. https://eur-lex.europa.eu/eli/reg/2016/679/oj.

Frankivsk District Court of Lviv. (2023). Rishennia Frankivskoho raionnoho sudu m. Lvova No. 465/1964/23 [Decision of the Frankivsk District Court of Lviv No. 465/1964/23]. https://reyestr.court.gov.ua/Review/111542290.

GDPR (2018, May). General Data Protection Regulation (GDPR). https://gdpr-info.eu/.

Goryca, T. (2023). The use of open sources of information in the activities of the formations responsible for protection of the executive bodies of the state. https://wsb.edu.pl/files/pages/634/security_forum_1_2023_doi_10_26410_sf_1_23_6.pdf.

Hadi, H., Harris, S., & Cao, Y. (2023). Cybersecurity as a service for Internet of Everything (IoE). https://doi.org/10.13140/RG.2.2.28225.94563.

Intelligence studies: Types of intelligence collection. (n.d.). https://usnwc.libguides.com/c.php?g=494120&p=3381426.

Islamic State supporters hijack dormant Twitter accounts. (n.d.). https://dig.watch/updates/islamic-state-supporters-hijack-dormant-twitter-accounts.

Jacobs, A., & Kloo, I. (2023). Detecting global events with Bayesian changepoint detection on flight data. https://www.ieworldconference.org/content/WP2023/Papers/GDRKMCC23_53.pdf.

Kamal, M. (2023). Legal implications of AI-driven OSINT: Insider threats and data leaks in Egypt and the European Union. https://doi.org/10.13140/RG.2.2.22359.65446.

Kędzierska, G. (2022). Intelligence gathering in forensic science. https://cris.mruni.eu/server/api/core/bitstreams/5f7805f9-e06b-49cc-a8ef-9c65740fe87d/content.

Khadim, S. W., Hassen, O. A., & Ibrahim, H. (2023). A review on the mechanism mitigating and eliminating internet crimes using modern technologies. Wasit Journal of Computer and Mathematics Science, 3, 50-68. https://doi.org/10.31185/wjcm.48.

Konieczny, M. (2025). Anti-OSINT methods ensuring protection of personal data in the context of cybercrime. RAIP, 1(25), 127-144. https://doi.org/10.5604/01.3001.0055.1100.

Konieczny, M.K. (2023). Cyberprzestępczość - krótka historia, współczesne oblicza i trudna do przewidzenia przyszłość. RAIP, 1(23), 29-50. https://doi.org/10.5604/01.3001.0016.3776.

Lakomy, M. (2023). Open-source intelligence and research on online terrorist communication: Identifying ethical and security dilemmas. Media, War & Conflict, 1-18. https://doi.org/10.1177/17506352231166322.

Larsen, O., Ngo, H., & Le-Khac, N. (2023). A quantitative study of the law enforcement in using open source intelligence techniques through undergraduate practical training. Forensic Science International: Digital Investigation, 47, 1-11. https://doi.org/10.1016/j.fsidi.2023.301622.

Lewulis, P. (2022). Collecting digital evidence from online sources: Deficiencies in current Polish criminal law. Criminal Law Forum, 33, 39-62. https://doi.org/10.1007/s10609-021-09430-4.

Narasimhan, P. K., Bhosale, C., Hasban, M. P., Naqvi, N. Z., Ecevit, M. I., Schwarz, K., & Creutzburg, R. (2023). Open-source intelligence (OSINT) investigation in Facebook. https://doi.org/10.2352/EI.2023.35.3.MOBMU-357.

Obaidat, M. J., Al-Syouf, I. A., Awawdeh, Y. F., Masa'deh, A. E., & Al-Haija, Q. A. (2025, July). Darknet Threats and Detection Strategies: A Concise Overview. In 2025 16th International Conference on Information and Communication Systems (ICICS) (pp. 1-6). IEEE. https://doi.org/10.1109/ICICS65354.2025.11073091.

OSINT Telegraph. (n.d.). Open source intelligence (OSINT): A comprehensive guide. https://osinttelegraph.com/open-source-intelligence-osint-a-comprehensive-guide/.

OSINT toolkit. (n.d.). https://i-intelligence.eu/resources/osint-toolkit.

Papayamma, K., Varanasi, A., & Marrapu, A. K. (2023). Internet of Things integration and the significance of block chain security. Innovations, 74, 789-798.

Putter, D., & Henrico, S. (2022). Social media intelligence: The national security-privacy nexus. South African Journal of Military Studies, 1, 19-44. https://doi.org/10.5787/50-1-1345.

Raharjo, A. (2023). Prevention of cybercrime through the development of criminal responsibility principles for internet users. Jurnal Dinamika Hukum, 3, 1-13. https://www.researchgate.net/publication/372168145_Prevention_of_Cybercrime_through_the_Development_of_Criminal_Responsibility_Principles_for_Internet_Users.

Riebe, T., Biselli, T., Reuter, C., & Kaufold, M.-A. (2023). Privacy concerns and acceptance factors of OSINT for cybersecurity: A representative survey. Proceedings on Privacy Enhancing Technologies, 1, 1-17. https://petsymposium.org/popets/2023/popets-2023-0028.pdf.

Stratton Oakmont, Inc. v. Prodigy Services Co. (1995). Retrieved 30 April, 2024, from https://en.wikipedia.org/wiki/Stratton_Oakmont,_Inc._v._Prodigy_Services_Co.

Usman, B., Mojaye, E. M., & Msughter, A. E. (2023). Online surveillance and data privacy of internet users: A discourse. Journal of Communication and Media Research, 15, 118-128.

Wolski, J. (2022). “Open-source intelligence” (OSINT): The development, types, capabilities, and limitations of the Method of Obtaining and Analysing Information Extracted from Open Sources (pp. 78-81). https://cba.gov.pl/download/1/7358/CBAMaterialypokonferencyjneLEAF2022Analizakryminalnawprzyszlosci.pdf.

Downloads

Published

2025-12-30

Issue

Section

Articles

How to Cite

Konieczny, M. (2025). Using Anti-OSINT to Create a Positive Image of Internet Users to Prevent Criminal Acts. Eastern European Journal of Transnational Relations, 9(2), 25-35. https://doi.org/10.15290/eejtr.2025.09.02.02